PERIMETER PROTECTION MODEL

STAGE

Decrease attack surface

TECHNOLOGY

NG/ URL
Email Security
Sandbox
DNS

Perimeter Protection

It includes solutions that protect against intrusions at the network and cloud levels, considering the protection of user navigation and, in general terms, solutions that face external threats that enter through the various communication protocols.

 

Protection Against Advanced Threats

It encompasses solutions that protect from advanced and persistent ransomware, malware, and threats that encompass multiple tactics, techniques, and procedures. These threats are very difficult to identify as they have changing and stealthy behaviors, therefore advanced and complementary controls are needed to detect them.

PROTECTION MODEL AGAINST ADVANCED THREATS

STAGE

TECHNOLOGY

Ingress and Communication Control.

SASE
Mail Protection (Sandbox, Phishing)
Vulnerability Management
DNS monitoring

Lateral Movement Detection.

EDR
NDR
UEBA
Deception
TIP

Movement and Access Prevention.

PAM
Virtual Patching
Endpoint Privilige Management
2FA
Microsegmentation
Encryption

USER PROTECTION MODEL

STAGE

TECHNOLOGY

Reduce the attack surface.

CSPM
CASB
DNS

Access control.

MFA
PAM
NBA
Deception

Detect and prevent (cloud).

DLP /CASB
UEBA/CASB
Sandbox/CASB
Antiphishing/BEC

Detect and prevent (network).

DLP
UEBA
EDR

User Protection

It includes solutions that protect internal users, their devices and systems against cyberattacks, as well as solutions that allow users to monitor their activity and thus detect anomalous or negligent behavior in time.

Hybrid Datacenter Protection

A hybrid Datacenter has certain components in a physical location with physical or virtual servers and appliances, and others are in servers / appliances in the cloud, therefore the solutions contemplated in this model are aimed at protecting both types of components and controlling access to them.

HYBRID DATACENTER PROTECTION MODEL

STAGE

TECHNOLOGY

Decrease attack surface

Vulnerability Scanner
Virtual Patch
CSPM
Worload Inventory

Access control.

Microsegmentation
MFA
PAM

Detect and prevent.

Cloud Workload
Security
DAM
EDR

APPLICATION PROTECTION MODEL

STAGE

TECHNOLOGY

Integration and development.

SAST
SCA

Testing / QA

IAST

Protection of applications in production

DAST
WAF
RASP

Application Protection

It includes solutions that protect cyberattack applications throughout the life cycle, from development through the QA stage until they are transferred to production.

OT Network Protection - Industrial Cybersecurity

It covers the solutions that protect OT Networks against advanced threats and give visibility to changes and anomalies that occur on the devices of this type of network.

OT NETWORKS PROTECTION MODEL

STAGE

TECHNOLOGY

Decrease the attack surface.

Monitoring and Visibility of OT Networks.

Access control.

NAC
MFA
PAM

Detect and prevent (network).

Monitoring and Visibility of OT Networks

ORCHESTRATION AND INTELLIGENCE MODEL

STAGE

TECHNOLOGY

Detection and correlation

SIEM

Cyber intelligence

Monitoring of digital assets in Deep and Dark Web
Monitoring of Social Networks
TIP - Threat Intelligence Platform

Automation and orchestration

SOAR

Asset Management

Asset Management

Orchestration and Intelligence

This model considers solutions that are cross-cutting to previous security models, which aim to optimize cybersecurity operation processes, give visibility and detect threats early to take mitigation actions in a timely manner.